Behaviour reflects personality: detecting co-residence attacks on Xen-based cloud environments Nikolaos PitropakisAggelos PikrakisCostas Lambrinoudakis Regular Contribution 08 August 2014 Pages: 299 - 305
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage Yong YuMan Ho AuLiju Dong Regular Contribution 29 August 2014 Pages: 307 - 318
Towards safer information sharing in the cloud Marco Casassa-MontIlaria MatteucciMarco Luca Sbodio Regular Contribution 23 August 2014 Pages: 319 - 334
On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform Andreu Pere Isern-DeyàLlorenç Huguet-RotgerMacià Mut-Puigserver Regular Contribution 15 August 2014 Pages: 335 - 345
Understanding the implemented access control policy of Android system services with slicing and extended static checking Tanveer MustafaKarsten Sohr Regular Contribution 03 September 2014 Pages: 347 - 366
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity Abdeljebar Ameziane El HassaniAnas Abou El KalamAbdellah Ait Ouahman Regular Contribution 20 August 2014 Pages: 367 - 385
Investigating the detection capabilities of antiviruses under concurrent attacks Mohammed I. Al-SalehFatima M. AbuHjeelaZiad A. Al-Sharif Regular Contribution 21 August 2014 Pages: 387 - 396